System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2495
- **State**: PUBLISHED
- **Published Date**: July 22, 2022 at 03:48 UTC
- **Last Updated**: August 03, 2024 at 00:39 UTC
- **Reserved Date**: July 20, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.21.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**microweber - microweber/microweber**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798)
2. [](https://github.com/microweber/microweber/commit/d35e691e72d358430abc8e99f5ba9eb374423b9f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38158
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 17:30 UTC
- **Last Updated**: May 21, 2025 at 21:07 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure IoT SDK Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - C SDK for Azure IoT**
Affected versions:
- 0 (Status: affected)
### References
1. [Azure IoT SDK Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22664
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 18:00 UTC
- **Last Updated**: August 03, 2024 at 03:21 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Logic Pro 10.7.3, GarageBand 10.4.6, macOS Monterey 12.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213183)
2. [](https://support.apple.com/en-us/HT213190)
3. [](https://support.apple.com/en-us/HT213191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21628
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 17:10 UTC
- **Last Updated**: January 09, 2025 at 18:10 UTC
- **Reserved Date**: December 29, 2024 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**chatwoot - chatwoot**
Affected versions:
- >= 2.16.1, < 3.16.0 (Status: affected)
### References
1. [https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9](https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9)
2. [https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b](https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46424
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 18:07 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_422BD4 function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36)
2. [](https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/3/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47334
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:21 UTC
- **Last Updated**: January 28, 2025 at 17:04 UTC
- **Reserved Date**: December 13, 2022 at 05:23 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In phasecheck server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28163
- **State**: PUBLISHED
- **Published Date**: April 01, 2021 at 14:20 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**The Eclipse Foundation - Eclipse Jetty**
Affected versions:
- 9.4.32 (Status: affected)
- unspecified (Status: affected)
- 10.0.0.beta2 (Status: affected)
- unspecified (Status: affected)
- 11.0.0.beta2 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq)
2. [[kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr opened a new pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39](https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0%40%3Cjira.kafka.apache.org%3E)
3. [[ignite-issues] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty](https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b%40%3Cissues.ignite.apache.org%3E)
4. [[ignite-dev] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty](https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e%40%3Cdev.ignite.apache.org%3E)
5. [[solr-issues] 20210414 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr](https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961%40%3Cissues.solr.apache.org%3E)
6. [[solr-issues] 20210414 [jira] [Created] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr](https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3%40%3Cissues.solr.apache.org%3E)
7. [[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty](https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd%40%3Cissues.ignite.apache.org%3E)
8. [[ignite-issues] 20210426 [jira] [Commented] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty](https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f%40%3Cissues.ignite.apache.org%3E)
9. [[ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) Upgrade Jetty version to fix CVE-2021-2816[3,4,5] in Jetty](https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46%40%3Cissues.ignite.apache.org%3E)
10. [FEDORA-2021-444e38face](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/)
11. [FEDORA-2021-35f06984d7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/)
12. [FEDORA-2021-fd66b2bd53](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/)
13. [[solr-issues] 20210507 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr](https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66%40%3Cissues.solr.apache.org%3E)
14. [[solr-issues] 20210623 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr](https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81%40%3Cissues.solr.apache.org%3E)
15. [[solr-issues] 20210711 [jira] [Created] (SOLR-15529) High security vulnerability in JDOM library bundled within Solr 8.9 CVE-2021-33813](https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6%40%3Cissues.solr.apache.org%3E)
16. [[solr-issues] 20210711 [jira] [Updated] (SOLR-15529) High security vulnerability in JDOM library bundled within Solr 8.9 CVE-2021-33813](https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f%40%3Cissues.solr.apache.org%3E)
17. [](https://security.netapp.com/advisory/ntap-20210611-0006/)
18. [[solr-issues] 20210813 [jira] [Resolved] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr](https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c%40%3Cissues.solr.apache.org%3E)
19. [[zookeeper-issues] 20210928 [jira] [Updated] (ZOOKEEPER-4390) CVE-2021-28169 , - Upgrade jetty to 9.4.42](https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a%40%3Cissues.zookeeper.apache.org%3E)
20. [[zookeeper-issues] 20210928 [jira] [Updated] (ZOOKEEPER-4390) CVE-2021-28169 , CVE-2021-28163, - Upgrade jetty to 9.4.42](https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450%40%3Cissues.zookeeper.apache.org%3E)
21. [[zookeeper-issues] 20210928 [jira] [Updated] (ZOOKEEPER-4390) CVE-2021-28169 , CVE-2021-28163, CVE-2021-34428- Upgrade jetty to 9.4.42](https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec%40%3Cissues.zookeeper.apache.org%3E)
22. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
23. [](https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084%40%3Cnotifications.zookeeper.apache.org%3E)
24. [](https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd%40%3Cnotifications.zookeeper.apache.org%3E)
25. [](https://www.oracle.com/security-alerts/cpujan2022.html)
26. [](https://www.oracle.com/security-alerts/cpuapr2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26944
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 11:59 UTC
- **Last Updated**: April 15, 2025 at 13:19 UTC
- **Reserved Date**: February 17, 2025 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in NotFound JetPopup allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetPopup: from n/a through 2.0.11.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**NotFound - JetPopup**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-11-broken-access-control-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32997
- **State**: PUBLISHED
- **Published Date**: May 25, 2022 at 13:33 UTC
- **Last Updated**: April 16, 2025 at 16:18 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The affected Baker Hughes Bentley Nevada products (3500 System 1 6.x, Part No. 3060/00 versions 6.98 and prior, 3500 System 1, Part No. 3071/xx & 3072/xx versions 21.1 HF1 and prior, 3500 Rack Configuration, Part No. 129133-01 versions 6.4 and prior, and 3500/22M Firmware, Part No. 288055-01 versions 5.05 and prior) utilize a weak encryption algorithm for storage and transmission of sensitive data, which may allow an attacker to more easily obtain credentials used for access.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-916: Security Weakness
### Affected Products
**Bentley Nevada, a Baker Hughes subsidiary - 3500 System 1 6.x, Part No. 3060/00**
Affected versions:
- All (Status: affected)
**Bentley Nevada, a Baker Hughes subsidiary - 3500 System 1, Part No. 3071/xx & 3072/xx**
Affected versions:
- All (Status: affected)
**Bentley Nevada, a Baker Hughes subsidiary - 3500 Rack Configuration, Part No. 129133-01**
Affected versions:
- All (Status: affected)
**Bentley Nevada, a Baker Hughes subsidiary - 3500/22M Firmware, Part No. 288055-01**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-231-02)
### Credits
- Ron Brash and Nicolas Harsey from Verve Industrial reported this vulnerability to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2152
- **State**: PUBLISHED
- **Published Date**: June 03, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 03, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors related to "product character attribute processing" for a document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ichitaro-attributes-code-execution(59037)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59037)
2. [40472](http://www.securityfocus.com/bid/40472)
3. [JVN#17293765](http://jvn.jp/en/jp/JVN17293765/index.html)
4. [ADV-2010-1283](http://www.vupen.com/english/advisories/2010/1283)
5. [40008](http://secunia.com/advisories/40008)
6. [](http://www.justsystems.com/jp/info/js10002.html)
7. [65050](http://osvdb.org/65050)
8. [JVNDB-2010-000024](http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000024.html)
9. [](http://www.ipa.go.jp/about/press/20100601.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20138
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 03:07 UTC
- **Last Updated**: December 02, 2024 at 15:47 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998291; Issue ID: MSV-1604.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**MediaTek, Inc. - MT3605, MT6985, MT6989, MT6990, MT7925, MT7927, MT8195, MT8370, MT8390**
Affected versions:
- Android 13.0, 14.0, 15.0 / SDK release 3.3 and before (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/December-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9039
- **State**: PUBLISHED
- **Published Date**: June 26, 2019 at 18:55 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Couchbase Sync Gateway 2.1.2, an attacker with access to the Sync Gateway’s public REST API was able to issue additional N1QL statements and extract sensitive data or call arbitrary N1QL functions through the parameters "startkey" and "endkey" on the "_all_docs" endpoint. By issuing nested queries with CPU-intensive operations they may have been able to cause increased resource usage and denial of service conditions. The _all_docs endpoint is not required for Couchbase Mobile replication and external access to this REST endpoint has been blocked to mitigate this issue. This issue has been fixed in versions 2.5.0 and 2.1.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.couchbase.com/sync-gateway/2.5/release-notes.html)
2. [](https://research.hisolutions.com/2019/06/n1ql-injection-in-couchbase-sync-gateway-cve-2019-9039/)
3. [](https://www.couchbase.com/resources/security#SecurityAlerts) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25908
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 05:00 UTC
- **Last Updated**: April 01, 2025 at 15:30 UTC
- **Reserved Date**: February 24, 2022 at 11:58 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - create-choo-electron**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953)
### Credits
- Mingqing Kang |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39980
- **State**: PUBLISHED
- **Published Date**: September 02, 2023 at 12:14 UTC
- **Last Updated**: September 27, 2024 at 16:02 UTC
- **Reserved Date**: August 08, 2023 at 07:09 UTC
- **Assigned By**: Moxa
### Vulnerability Description
A vulnerability that allows the unauthorized disclosure of authenticated information has been identified in MXsecurity versions prior to v1.0.1. This vulnerability arises when special elements are not neutralized correctly, allowing remote attackers to alter SQL commands.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Moxa - MXsecurity Series**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21149
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 00:00 UTC
- **Last Updated**: December 03, 2024 at 15:13 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In registerGsmaServiceIntentReceiver of ShannonRcsService.java, there is a possible way to activate/deactivate RCS service due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270050709References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27935
- **State**: PUBLISHED
- **Published Date**: July 17, 2022 at 20:55 UTC
- **Last Updated**: August 03, 2024 at 05:41 UTC
- **Reserved Date**: March 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.pexip.com/admin/security_bulletins.htm#CVE-2022-27935) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46345
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 17:20 UTC
- **Last Updated**: May 02, 2025 at 17:39 UTC
- **Reserved Date**: April 22, 2025 at 22:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Auth0 Account Link Extension is an extension aimed to help link accounts easily. Versions 2.3.4 to 2.6.6 do not verify the signature of the provided JWT. This allows the user the ability to supply a forged token and the potential to access user information without proper authorization. This issue has been patched in versions 2.6.7, 2.7.0, and 3.0.0. It is recommended to upgrade to version 3.0.0 or greater.
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**auth0-extensions - auth0-account-link-extension**
Affected versions:
- >= 2.3.4, < 2.6.7 (Status: affected)
### References
1. [https://github.com/auth0-extensions/auth0-account-link-extension/security/advisories/GHSA-j2jh-rqff-7vmg](https://github.com/auth0-extensions/auth0-account-link-extension/security/advisories/GHSA-j2jh-rqff-7vmg)
2. [https://github.com/auth0-extensions/auth0-account-link-extension/pull/187](https://github.com/auth0-extensions/auth0-account-link-extension/pull/187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16976
- **State**: REJECTED
- **Published Date**: October 30, 2019 at 15:36 UTC
- **Last Updated**: October 30, 2019 at 15:36 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0562
- **State**: PUBLISHED
- **Published Date**: April 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: February 26, 2005 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
GIF file validation error in MSN Messenger 6.2 allows remote attackers in a user's contact list to execute arbitrary code via a GIF image with an improper height and width.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [msn-messenger-gif-execute-code(19950)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19950)
2. [VU#633446](http://www.kb.cert.org/vuls/id/633446)
3. [14915](http://secunia.com/advisories/14915/)
4. [MS05-022](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-022)
5. [oval:org.mitre.oval:def:4927](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4927)
6. [TA05-102A](http://www.us-cert.gov/cas/techalerts/TA05-102A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38639
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 18:49 UTC
- **Last Updated**: August 03, 2024 at 11:02 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mdnice/markdown-nice/issues/327) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22105
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 19:09 UTC
- **Reserved Date**: January 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jungo.com/windriver/versions/)
2. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf)
3. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26627
- **State**: PUBLISHED
- **Published Date**: April 07, 2022 at 14:24 UTC
- **Last Updated**: August 03, 2024 at 05:11 UTC
- **Reserved Date**: March 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Project Time Management System v1.0 was discovered to contain an arbitrary file write vulnerability which allows attackers to execute arbitrary code via a crafted HTML file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/qerogram/BUG_WEB/tree/main/OpenSource/PTMS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20193
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 17:46 UTC
- **Last Updated**: May 07, 2025 at 17:58 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an authenticated, low-privileged, remote attacker to perform an injection attack against an affected device.r
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to read files from the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- 17.3.1 (Status: affected)
- 17.3.2 (Status: affected)
- 17.3.3 (Status: affected)
- 17.3.1a (Status: affected)
- 17.3.1w (Status: affected)
- 17.3.2a (Status: affected)
- 17.3.1x (Status: affected)
- 17.3.1z (Status: affected)
- 17.3.4 (Status: affected)
- 17.3.5 (Status: affected)
- 17.3.4a (Status: affected)
- 17.3.6 (Status: affected)
- 17.3.4b (Status: affected)
- 17.3.4c (Status: affected)
- 17.3.5a (Status: affected)
- 17.3.5b (Status: affected)
- 17.3.7 (Status: affected)
- 17.3.8 (Status: affected)
- 17.3.8a (Status: affected)
- 17.4.1 (Status: affected)
- 17.4.2 (Status: affected)
- 17.4.1a (Status: affected)
- 17.4.1b (Status: affected)
- 17.4.2a (Status: affected)
- 17.5.1 (Status: affected)
- 17.5.1a (Status: affected)
- 17.6.1 (Status: affected)
- 17.6.2 (Status: affected)
- 17.6.1w (Status: affected)
- 17.6.1a (Status: affected)
- 17.6.1x (Status: affected)
- 17.6.3 (Status: affected)
- 17.6.1y (Status: affected)
- 17.6.1z (Status: affected)
- 17.6.3a (Status: affected)
- 17.6.4 (Status: affected)
- 17.6.1z1 (Status: affected)
- 17.6.5 (Status: affected)
- 17.6.6 (Status: affected)
- 17.6.6a (Status: affected)
- 17.6.5a (Status: affected)
- 17.6.7 (Status: affected)
- 17.7.1 (Status: affected)
- 17.7.1a (Status: affected)
- 17.7.1b (Status: affected)
- 17.7.2 (Status: affected)
- 17.10.1 (Status: affected)
- 17.10.1a (Status: affected)
- 17.10.1b (Status: affected)
- 17.8.1 (Status: affected)
- 17.8.1a (Status: affected)
- 17.9.1 (Status: affected)
- 17.9.1w (Status: affected)
- 17.9.2 (Status: affected)
- 17.9.1a (Status: affected)
- 17.9.1x (Status: affected)
- 17.9.1y (Status: affected)
- 17.9.3 (Status: affected)
- 17.9.2a (Status: affected)
- 17.9.1x1 (Status: affected)
- 17.9.3a (Status: affected)
- 17.9.4 (Status: affected)
- 17.9.1y1 (Status: affected)
- 17.9.5 (Status: affected)
- 17.9.4a (Status: affected)
- 17.9.5a (Status: affected)
- 17.9.5b (Status: affected)
- 17.9.5e (Status: affected)
- 17.9.5f (Status: affected)
- 17.11.1 (Status: affected)
- 17.11.1a (Status: affected)
- 17.12.1 (Status: affected)
- 17.12.1w (Status: affected)
- 17.12.1a (Status: affected)
- 17.12.1x (Status: affected)
- 17.12.2 (Status: affected)
- 17.12.3 (Status: affected)
- 17.12.2a (Status: affected)
- 17.12.1y (Status: affected)
- 17.12.1z (Status: affected)
- 17.12.3a (Status: affected)
- 17.12.1z1 (Status: affected)
- 17.13.1 (Status: affected)
- 17.13.1a (Status: affected)
- 17.14.1 (Status: affected)
- 17.14.1a (Status: affected)
- 17.11.99SW (Status: affected)
### References
1. [cisco-sa-webui-multi-ARNHM4v6](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7494
- **State**: PUBLISHED
- **Published Date**: October 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Kontan Kiosk (aka com.appsfoundry.scoopwl.id.kontankiosk) application @7F07025E for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#510161](http://www.kb.cert.org/vuls/id/510161)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4985
- **State**: PUBLISHED
- **Published Date**: November 01, 2011 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:09 UTC
- **Reserved Date**: November 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in notes.php in My Kazaam Notes Management System allows remote attackers to inject arbitrary web script or HTML via vectors involving the "Enter Reference Number Below" text box.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [41542](http://www.securityfocus.com/bid/41542)
2. [](http://packetstormsecurity.org/1007-exploits/mykazaamnms-sqlxss.txt)
3. [notes-notes-xss(60253)](https://exchange.xforce.ibmcloud.com/vulnerabilities/60253)
4. [8494](http://securityreason.com/securityalert/8494)
5. [14325](http://www.exploit-db.com/exploits/14325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8734
- **State**: PUBLISHED
- **Published Date**: September 13, 2017 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 18:23 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8751, and CVE-2017-11766.
### Affected Products
**Microsoft Corporation - Microsoft Edge**
Affected versions:
- Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016. (Status: affected)
### References
1. [1039326](http://www.securitytracker.com/id/1039326)
2. [42759](https://www.exploit-db.com/exploits/42759/)
3. [100738](http://www.securityfocus.com/bid/100738)
4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42467
- **State**: PUBLISHED
- **Published Date**: September 11, 2023 at 00:00 UTC
- **Last Updated**: September 26, 2024 at 17:36 UTC
- **Reserved Date**: September 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/qemu-project/qemu/-/issues/1813)
2. [](https://gitlab.com/qemu-project/qemu/-/commit/7cfcc79b0ab800959716738aff9419f53fc68c9c)
3. [](https://security.netapp.com/advisory/ntap-20231103-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17664
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://downloads.digium.com/pub/security/AST-2017-012.html)
2. [](https://issues.asterisk.org/jira/browse/ASTERISK-27429)
3. [102201](http://www.securityfocus.com/bid/102201)
4. [1040009](http://www.securitytracker.com/id/1040009)
5. [DSA-4076](https://www.debian.org/security/2017/dsa-4076)
6. [](https://issues.asterisk.org/jira/browse/ASTERISK-27382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18446
- **State**: PUBLISHED
- **Published Date**: October 12, 2022 at 00:00 UTC
- **Last Updated**: May 16, 2025 at 13:47 UTC
- **Reserved Date**: October 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dotPDN Paint.NET before 4.1.2 allows Deserialization of Untrusted Data (issue 1 of 2).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dotpdn.com)
2. [](https://www.getpaint.net)
3. [](https://blog.getpaint.net/2018/10/22/paint-net-4-1-2-is-now-available/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33685
- **State**: PUBLISHED
- **Published Date**: September 14, 2021 at 11:21 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Business One version - 10.0 allows low-level authorized attacker to traverse the file system to access files or directories that are outside of the restricted directory. A successful attack allows access to high level sensitive data
### Affected Products
**SAP SE - SAP Business One**
Affected versions:
- < 10.0 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405)
2. [](https://launchpad.support.sap.com/#/notes/3069032) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4273
- **State**: PUBLISHED
- **Published Date**: August 09, 2023 at 14:53 UTC
- **Last Updated**: February 27, 2025 at 21:05 UTC
- **Reserved Date**: August 09, 2023 at 13:05 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.8.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-362.8.1.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [RHSA-2023:6583](https://access.redhat.com/errata/RHSA-2023:6583)
2. [](https://access.redhat.com/security/cve/CVE-2023-4273)
3. [RHBZ#2221609](https://bugzilla.redhat.com/show_bug.cgi?id=2221609)
4. [](https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/)
### Credits
- Red Hat would like to thank Maxim Suhanov for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27656
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 15:35 UTC
- **Reserved Date**: March 05, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Password Stored in Process List V-2023-011.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm)
2. [](https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1076
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19991026 Mac OS 9 Idle Lock Bug](http://marc.info/?l=bugtraq&m=94096348604173&w=2)
2. [745](http://www.securityfocus.com/bid/745) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0351
- **State**: PUBLISHED
- **Published Date**: September 10, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 05, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [fortios-cve20140351-mitm(96119)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96119)
2. [69754](http://www.securityfocus.com/bid/69754)
3. [](http://www.fortiguard.com/advisory/FG-IR-14-006/)
4. [VU#730964](http://www.kb.cert.org/vuls/id/730964) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1313
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 13:41 UTC
- **Last Updated**: August 03, 2024 at 00:03 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in tab groups in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_11.html)
2. [](https://crbug.com/1270539)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5231
- **State**: PUBLISHED
- **Published Date**: June 07, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150825 CVE-2015-5228 & CVE-2015-5231 in the criu service daemon](http://www.openwall.com/lists/oss-security/2015/08/25/5)
2. [openSUSE-SU-2015:1593](http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html)
3. [[CRIU] 20150825 Hardening the criu service daemon](https://lists.openvz.org/pipermail/criu/2015-August/021847.html)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1256728) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38692
- **State**: PUBLISHED
- **Published Date**: August 04, 2023 at 17:22 UTC
- **Last Updated**: October 10, 2024 at 15:53 UTC
- **Reserved Date**: July 24, 2023 at 16:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CloudExplorer Lite is an open source, lightweight cloud management platform. Versions prior to 1.3.1 contain a command injection vulnerability in the installation function in module management. The vulnerability has been fixed in v1.3.1. There are no known workarounds aside from upgrading.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**CloudExplorer-Dev - CloudExplorer-Lite**
Affected versions:
- < 1.3.1 (Status: affected)
### References
1. [https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-7wrc-f42m-9v5w](https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-7wrc-f42m-9v5w)
2. [https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/blob/v1.3.0/framework/management-center/backend/src/main/java/com/fit2cloud/controller/ModuleManageController.java](https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/blob/v1.3.0/framework/management-center/backend/src/main/java/com/fit2cloud/controller/ModuleManageController.java)
3. [https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/releases/tag/v1.3.1](https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/releases/tag/v1.3.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43416
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 16:27 UTC
- **Last Updated**: November 18, 2024 at 18:34 UTC
- **Reserved Date**: August 12, 2024 at 18:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.80, < 10.0.17 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7](https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7)
2. [https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d](https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10076
- **State**: PUBLISHED
- **Published Date**: July 02, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zoho ManageEngine EventLog Analyzer 11.12. A Cross-Site Scripting vulnerability allows a remote attacker to inject arbitrary web script or HTML via the search functionality (the search box of the Dashboard).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/eventlog/release-notes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16999
- **State**: PUBLISHED
- **Published Date**: November 11, 2020 at 06:47 UTC
- **Last Updated**: September 10, 2024 at 15:51 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows WalletService Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16999) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46785
- **State**: PUBLISHED
- **Published Date**: May 13, 2022 at 15:01 UTC
- **Last Updated**: August 04, 2024 at 05:17 UTC
- **Reserved Date**: April 25, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/5/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8761
- **State**: PUBLISHED
- **Published Date**: October 22, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: October 13, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
inc/template.php in DokuWiki before 2014-05-05a only checks for access to the root namespace, which allows remote attackers to access arbitrary images via a media file details ajax call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61983](http://secunia.com/advisories/61983)
2. [](http://advisories.mageia.org/MGASA-2014-0438.html)
3. [](https://github.com/splitbrain/dokuwiki/issues/765)
4. [[oss-security] 20141013 CVE request: various security flaws in dokuwiki](http://www.openwall.com/lists/oss-security/2014/10/13/3)
5. [[oss-security] 20141016 Re: CVE request: various security flaws in dokuwiki](http://www.openwall.com/lists/oss-security/2014/10/16/9)
6. [DSA-3059](http://www.debian.org/security/2014/dsa-3059)
7. [](https://bugs.dokuwiki.org/index.php?do=details&task_id=2647#comment6204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18591
- **State**: PUBLISHED
- **Published Date**: August 27, 2019 at 12:03 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The gd-rating-system plugin before 2.1 for WordPress has XSS in log.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/gd-rating-system/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36516
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 13:36 UTC
- **Last Updated**: August 23, 2024 at 15:20 UTC
- **Reserved Date**: May 29, 2024 at 19:31 UTC
- **Assigned By**: ManageEngine
### Vulnerability Description
Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in dashboard.
Note: This vulnerability is different from another vulnerability (CVE-2024-36515), both of which have affected ADAudit Plus' dashboard.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ManageEngine - ADAudit Plus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.manageengine.com/products/active-directory-audit/cve-2024-36516.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7259
- **State**: PUBLISHED
- **Published Date**: December 20, 2016 at 05:54 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Graphics Component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.quarkslab.com/cve-2016-7259-an-empty-file-into-the-blue.html)
2. [MS16-151](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-151)
3. [1037452](http://www.securitytracker.com/id/1037452)
4. [20161214 Secunia Research: Microsoft Windows Type 1 Font Processing Vulnerability](http://www.securityfocus.com/archive/1/539919/100/0/threaded)
5. [94771](http://www.securityfocus.com/bid/94771)
6. [](http://packetstormsecurity.com/files/140172/Microsoft-Windows-Type-1-Font-Processing-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3207
- **State**: PUBLISHED
- **Published Date**: July 18, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in cms/modules/form.lib.php in Pragyan CMS 2.6.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the (1) sourceFolder or (2) moduleFolder parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30235](http://www.securityfocus.com/bid/30235)
2. [6078](https://www.exploit-db.com/exploits/6078)
3. [4010](http://securityreason.com/securityalert/4010)
4. [pragyan-sourcefolder-file-include(43777)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43777)
5. [31101](http://secunia.com/advisories/31101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2339
- **State**: PUBLISHED
- **Published Date**: July 14, 2017 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.
### Affected Products
**Juniper Networks - ScreenOS**
Affected versions:
- 6.3.0 prior to 6.3.0r24 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA10782)
2. [1038881](http://www.securitytracker.com/id/1038881)
3. [99590](http://www.securityfocus.com/bid/99590)
### Credits
- Gaku Mochizuki/Toshitsugu Yoneyama from Mitsui Bussan Secure Directions, Inc., for reporting this issue to the JPCERT/CC.
- Craig Young, Principal Security Researcher, Tripwire VERT, for responsibly reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41040
- **State**: PUBLISHED
- **Published Date**: February 01, 2022 at 11:12 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 13, 2021 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse Wakaama, ever since its inception until 2021-01-14, the CoAP parsing code does not properly sanitize network-received data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=577968)
2. [](https://github.com/eclipse/wakaama/pull/640) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1346
- **State**: PUBLISHED
- **Published Date**: February 04, 2021 at 16:40 UTC
- **Last Updated**: November 08, 2024 at 23:51 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210203 Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5264
- **State**: PUBLISHED
- **Published Date**: August 05, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 03, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3640](http://www.debian.org/security/2016/dsa-3640)
2. [1036508](http://www.securitytracker.com/id/1036508)
3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
4. [USN-3044-1](http://www.ubuntu.com/usn/USN-3044-1)
5. [92258](http://www.securityfocus.com/bid/92258)
6. [RHSA-2016:1551](http://rhn.redhat.com/errata/RHSA-2016-1551.html)
7. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15)
8. [](http://www.mozilla.org/security/announce/2016/mfsa2016-79.html)
9. [openSUSE-SU-2016:1964](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html)
10. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1286183)
11. [openSUSE-SU-2016:2026](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4226
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 13:15 UTC
- **Last Updated**: September 17, 2024 at 03:59 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MobileFirst Platform Foundation 8.0.0.0 stores highly sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 175207.
### Affected Products
**IBM - MobileFirst Platform Foundation**
Affected versions:
- 8.0.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6216813)
2. [ibm-worklight-cve20204226-info-disc (175207)](https://exchange.xforce.ibmcloud.com/vulnerabilities/175207) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0709
- **State**: PUBLISHED
- **Published Date**: October 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: July 18, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerabilities in the Web Reports Server for SurfControl SuperScout WebFilter allow remote attackers to execute arbitrary SQL queries via the RunReport option to SimpleBar.dll, and possibly other DLLs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5859](http://www.securityfocus.com/bid/5859)
2. [20021002 wp--02-0005: Multiple Vulnerabilities in SuperScout Web Reports Server](http://marc.info/?l=bugtraq&m=103359690824103&w=2)
3. [superscout-webfilter-sql-injection(10245)](http://www.iss.net/security_center/static/10245.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0304
- **State**: PUBLISHED
- **Published Date**: December 21, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: November 09, 2016 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing and the live firewall rules in use are not affected.
### Affected Products
**F5 Networks, Inc. - BIG-IP AFM**
Affected versions:
- 12.0.0, 12.1.0, 12.1.1, 12.1.2 (Status: affected)
- 13.0.0 (Status: affected)
### References
1. [102332](http://www.securityfocus.com/bid/102332)
2. [](https://support.f5.com/csp/article/K39428424)
3. [1040041](http://www.securitytracker.com/id/1040041) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25200
- **State**: PUBLISHED
- **Published Date**: October 01, 2020 at 17:36 UTC
- **Last Updated**: November 18, 2024 at 16:02 UTC
- **Reserved Date**: September 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pritunl.com)
2. [](https://pritunl.com/security)
3. [](https://github.com/lukaszstu/pritunl/blob/master/CVE-2020-25200) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14837
- **State**: PUBLISHED
- **Published Date**: January 07, 2020 at 16:33 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 10, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
### Weakness Classification (CWE)
- CWE-547: Security Weakness
### Affected Products
**Red Hat - keycloak**
Affected versions:
- before 8.0.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837)
2. [](https://issues.jboss.org/browse/KEYCLOAK-10780)
3. [](https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37567
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 01:46 UTC
- **Last Updated**: November 06, 2024 at 14:28 UTC
- **Reserved Date**: July 07, 2023 at 08:46 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Command injection vulnerability in ELECOM and LOGITEC wireless LAN routers allows a remote unauthenticated attacker to execute an arbitrary command by sending a specially crafted request to a certain port of the web management page. Affected products and versions are as follows: WRC-1167GHBK3-A v1.24 and earlier, WRC-F1167ACF2 all versions, WRC-600GHBK-A all versions, WRC-733FEBK2-A all versions, WRC-1467GHBK-A all versions, WRC-1900GHBK-A all versions, and LAN-W301NR all versions.
### Affected Products
**ELECOM CO.,LTD. - WRC-1167GHBK3-A**
Affected versions:
- v1.24 and earlier (Status: affected)
**ELECOM CO.,LTD. - WRC-F1167ACF2**
Affected versions:
- all versions (Status: affected)
**ELECOM CO.,LTD. - WRC-600GHBK-A**
Affected versions:
- all versions (Status: affected)
**ELECOM CO.,LTD. - WRC-733FEBK2-A**
Affected versions:
- all versions (Status: affected)
**ELECOM CO.,LTD. - WRC-1467GHBK-A**
Affected versions:
- all versions (Status: affected)
**ELECOM CO.,LTD. - WRC-1900GHBK-A**
Affected versions:
- all versions (Status: affected)
**LOGITEC CORPORATION - LAN-W301NR**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.elecom.co.jp/news/security/20230810-01/)
2. [](https://www.elecom.co.jp/news/security/20230711-01/)
3. [](https://jvn.jp/en/vu/JVNVU91850798/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29579
- **State**: PUBLISHED
- **Published Date**: April 24, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 14:14 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yasm/yasm/issues/214)
2. [](https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3145
- **State**: PUBLISHED
- **Published Date**: April 03, 2025 at 06:31 UTC
- **Last Updated**: April 03, 2025 at 19:13 UTC
- **Reserved Date**: April 02, 2025 at 20:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in MindSpore 2.5.0. Affected by this issue is the function mindspore.numpy.fft.rfft2. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - MindSpore**
Affected versions:
- 2.5.0 (Status: affected)
### References
1. [VDB-303050 | MindSpore mindspore.numpy.fft.rfft2 memory corruption](https://vuldb.com/?id.303050)
2. [VDB-303050 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.303050)
3. [](https://gitee.com/mindspore/mindspore/issues/IBVKM8)
### Credits
- VulDB Gitee Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6554
- **State**: PUBLISHED
- **Published Date**: September 04, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: February 02, 2018 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Linux Kernel - Linux Kernel**
Affected versions:
- before 4.17 (Status: affected)
### References
1. [USN-3776-1](https://usn.ubuntu.com/3776-1/)
2. [USN-3776-2](https://usn.ubuntu.com/3776-2/)
3. [USN-3777-1](https://usn.ubuntu.com/3777-1/)
4. [USN-3775-1](https://usn.ubuntu.com/3775-1/)
5. [[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html)
6. [[stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket](https://www.spinics.net/lists/stable/msg255030.html)
7. [DSA-4308](https://www.debian.org/security/2018/dsa-4308)
8. [105302](http://www.securityfocus.com/bid/105302)
9. [USN-3775-2](https://usn.ubuntu.com/3775-2/)
10. [USN-3777-2](https://usn.ubuntu.com/3777-2/)
11. [USN-3777-3](https://usn.ubuntu.com/3777-3/)
12. [[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html)
13. [[stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket](https://www.spinics.net/lists/stable/msg255034.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6025
- **State**: PUBLISHED
- **Published Date**: July 11, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 14, 2024 at 20:35 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Quiz and Survey Master (QSM) WordPress plugin before 9.0.5 does not sanitise and escape some of its Quiz settings, which could allow contributors and higher to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Quiz and Survey Master (QSM) **
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/15abc7dd-95b1-4dad-ba25-eb65105d3925/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2107
- **State**: PUBLISHED
- **Published Date**: May 23, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93452](http://osvdb.org/93452)
2. [[oss-security] 20130518 Re: CVE request: WordPress plugin mail-on-update CSRF](http://seclists.org/oss-sec/2013/q2/356)
3. [](http://wordpress.org/plugins/mail-on-update/changelog)
4. [53449](http://secunia.com/advisories/53449) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2392
- **State**: PUBLISHED
- **Published Date**: July 15, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apple Quicktime before 7.2 on Mac OS X 10.3.9 and 10.4.9 allows user-assisted remote attackers to execute arbitrary code via a crafted movie file that triggers memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26034](http://secunia.com/advisories/26034)
2. [1018373](http://www.securitytracker.com/id?1018373)
3. [VU#582681](http://www.kb.cert.org/vuls/id/582681)
4. [TA07-193A](http://www.us-cert.gov/cas/techalerts/TA07-193A.html)
5. [quicktime-moviefile-code-execution(35353)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35353)
6. [ADV-2007-2510](http://www.vupen.com/english/advisories/2007/2510)
7. [24873](http://www.securityfocus.com/bid/24873)
8. [](http://docs.info.apple.com/article.html?artnum=305947)
9. [36136](http://osvdb.org/36136)
10. [APPLE-SA-2007-07-11](http://lists.apple.com/archives/Security-announce/2007/Jul/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15725
- **State**: PUBLISHED
- **Published Date**: September 16, 2019 at 16:50 UTC
- **Last Updated**: August 05, 2024 at 00:56 UTC
- **Reserved Date**: August 28, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. An IDOR in the epic notes API that could result in disclosure of private milestones, labels, and other information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ee/issues/11431)
2. [](https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30209
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 22:37 UTC
- **Last Updated**: January 02, 2025 at 19:24 UTC
- **Reserved Date**: May 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows IIS Server Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
### References
1. [Windows IIS Server Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30209) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9873
- **State**: PUBLISHED
- **Published Date**: August 06, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: June 24, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Integer underflow in drivers/char/diag/diag_dci.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges or obtain sensitive information via a crafted application, aka Android internal bug 28750726 and Qualcomm internal bug CR556860.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [92219](http://www.securityfocus.com/bid/92219)
3. [](https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=ef29ae1d40536fef7fb95e4d5bb5b6b57bdf9420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20553
- **State**: PUBLISHED
- **Published Date**: December 18, 2024 at 23:39 UTC
- **Last Updated**: December 19, 2024 at 16:39 UTC
- **Reserved Date**: December 17, 2020 at 19:17 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 5.2.0.0 (Status: affected)
- 6.0.0.0 (Status: affected)
- 6.0.1.0 (Status: affected)
- 6.1.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6496761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4680
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 08:41 UTC
- **Last Updated**: June 10, 2025 at 14:20 UTC
- **Reserved Date**: May 14, 2025 at 09:13 UTC
- **Assigned By**: upKeeper
### Vulnerability Description
Improper Input Validation vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects upKeeper Instant Privilege Access: before 1.4.0.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**upKeeper Solutions - upKeeper Instant Privilege Access**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://support.upkeeper.se/hc/en-us/articles/20159822847900-CVE-2025-4680-Improper-Input-Validation) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1291
- **State**: PUBLISHED
- **Published Date**: April 20, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 19:20 UTC
- **Reserved Date**: December 07, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Fineract 1.0.0, 0.6.0-incubating, 0.5.0-incubating, 0.4.0-incubating exposes different REST end points to query domain specific entities with a Query Parameter 'orderBy' which are appended directly with SQL statements. A hacker/user can inject/draft the 'orderBy' query parameter by way of the "order" param in such a way to read/update the data for which he doesn't have authorization.
### Affected Products
**Apache Software Foundation - Apache Fineract**
Affected versions:
- 1.0.0 (Status: affected)
- 0.6.0-incubating (Status: affected)
- 0.5.0-incubating (Status: affected)
- 0.4.0-incubating (Status: affected)
### References
1. [[dev] 20180419 [SECURITY] CVE-2018-1291: Apache Fineract SQL Injection Vulnerability - Order by injection via Order Param](https://lists.apache.org/thread.html/1f7fadc93500b3fe14603b132b13c18fff3d0a35e50ebd0246f325c0%40%3Cdev.fineract.apache.org%3E)
2. [104008](http://www.securityfocus.com/bid/104008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32234
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 07:39 UTC
- **Reserved Date**: June 02, 2022 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Facebook - Hermes**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/facebook/hermes/commit/06eaec767e376bfdb883d912cb15e987ddf2bda1)
2. [](https://www.facebook.com/security/advisories/CVE-2022-32234) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5457
- **State**: PUBLISHED
- **Published Date**: October 14, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:31 UTC
- **Reserved Date**: October 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Michael Dempfle Joomla Flash Uploader (com_jfu or com_joomla_flash_uploader) 2.5.1 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) install.joomla_flash_uploader.php and (2) uninstall.joomla_flash_uploader.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080117 JoomlaFlash Component Multiple Remote File Inclusion](http://www.securityfocus.com/archive/1/486475/100/0/threaded)
2. [joomlaflash-flashuploader-file-include(39737)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39737)
3. [4521](https://www.exploit-db.com/exploits/4521)
4. [26044](http://www.securityfocus.com/bid/26044)
5. [joomla-flashuploader-file-include(37181)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37181) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1178
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 06:31 UTC
- **Last Updated**: April 11, 2025 at 22:03 UTC
- **Reserved Date**: February 10, 2025 at 10:46 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**GNU - Binutils**
Affected versions:
- 2.43 (Status: affected)
### References
1. [VDB-295081 | GNU Binutils ld libbfd.c bfd_putl64 memory corruption](https://vuldb.com/?id.295081)
2. [VDB-295081 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.295081)
3. [Submit #495369 | GNU ld 2.43 Illegal write access](https://vuldb.com/?submit.495369)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=32638)
5. [](https://sourceware.org/bugzilla/attachment.cgi?id=15914)
6. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0)
7. [](https://www.gnu.org/)
### Credits
- wenjusun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4569
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0537
- **State**: PUBLISHED
- **Published Date**: February 04, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the POP3 server in Kinesphere Corporation eXchange before 5.0.060125 allows remote attackers to execute arbitrary code via a long RCPT TO argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1466](https://www.exploit-db.com/exploits/1466)
2. [408](http://securityreason.com/securityalert/408)
3. [18687](http://secunia.com/advisories/18687)
4. [](http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl)
5. [ADV-2006-0437](http://www.vupen.com/english/advisories/2006/0437)
6. [20060203 Exchangepop3 rcpt buffer overflow vulnerability](http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html)
7. [16485](http://www.securityfocus.com/bid/16485)
8. [22907](http://www.osvdb.org/22907)
9. [exchangepop3-rcptto-bo(24477)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24477)
10. [1015580](http://securitytracker.com/id?1015580) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4018
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 20:29 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 19, 2024 at 20:24 UTC
- **Assigned By**: BT
### Vulnerability Description
Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows, 64 bit (local appliance api modules) allows Privilege Escalation.This issue affects U-Series Appliance: from 3.4 before 4.0.3.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**BeyondTrust - U-Series Appliance**
Affected versions:
- 3.4 (Status: affected)
### References
1. [](https://www.beyondtrust.com/docs/release-notes/u-series-appliance/bt-appliance-u-series-software-4-0-3.htm)
### Credits
- Paolo Caminati
- Daniele Montanaro |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1409
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 18:53 UTC
- **Last Updated**: August 04, 2024 at 18:20 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows Remote Procedure Call (RPC) runtime improperly initializes objects in memory, aka 'Windows Remote Procedure Call Information Disclosure Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1409) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3227
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 02:31 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 02, 2024 at 18:14 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Panwei eoffice OA up to 9.5. It has been declared as critical. This vulnerability affects unknown code of the file /general/system/interface/theme_set/save_image.php of the component Backend. The manipulation of the argument image_type leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259072.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-24: Security Weakness
### Affected Products
**Panwei - eoffice OA**
Affected versions:
- 9.0 (Status: affected)
- 9.1 (Status: affected)
- 9.2 (Status: affected)
- 9.3 (Status: affected)
- 9.4 (Status: affected)
- 9.5 (Status: affected)
### References
1. [VDB-259072 | Panwei eoffice OA Backend save_image.php path traversal](https://vuldb.com/?id.259072)
2. [VDB-259072 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259072)
3. [Submit #308750 | Panwei Network Technology Co., Ltd. eoffice v9.5 files upload](https://vuldb.com/?submit.308750)
4. [](https://github.com/garboa/cve_3/blob/main/upload.md)
### Credits
- Guo Jiabao (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7305
- **State**: PUBLISHED
- **Published Date**: January 22, 2014 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:26 UTC
- **Reserved Date**: January 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fpw.php in e107 through 1.0.4 does not check the user_ban field, which makes it easier for remote attackers to reset passwords by sending a pwsubmit request and leveraging access to the e-mail account of a banned user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/p/e107/svn/13114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6636
- **State**: PUBLISHED
- **Published Date**: July 03, 2019 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 20:23 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP (AFM, ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, and 11.5.1-11.6.4, a stored cross-site scripting vulnerability in AFM feed list. In the worst case, an attacker can store a CSRF which results in code execution as the admin user. The level of user role which can perform this attack are resource administrator and administrator.
### Affected Products
**F5 - BIG-IP (AFM, ASM)**
Affected versions:
- BIG-IP (AFM (Status: affected)
- ASM) 14.1.0-14.1.0.5 (Status: affected)
- 14.0.0-14.0.0.4 (Status: affected)
- 13.0.0-13.1.1.4 (Status: affected)
- 12.1.0-12.1.4 (Status: affected)
- 11.5.1-11.6.4 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K68151373)
2. [109108](http://www.securityfocus.com/bid/109108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2668
- **State**: PUBLISHED
- **Published Date**: May 14, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in webdesproxy 0.0.1 allows remote attackers to execute arbitrary code via a long URL, possibly involving the process_connection_request function in webdesproxy.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40741](http://osvdb.org/40741)
2. [23962](http://www.securityfocus.com/bid/23962)
3. [ADV-2007-1802](http://www.vupen.com/english/advisories/2007/1802)
4. [3913](https://www.exploit-db.com/exploits/3913) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2265
- **State**: REJECTED
- **Published Date**: October 09, 2013 at 14:44 UTC
- **Last Updated**: September 17, 2024 at 03:33 UTC
- **Reserved Date**: April 16, 2012 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3756
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 03:34 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and block signature verification bypass in the transaction and block validator allowing a single node to sign a transaction and/or block multiple times, each with a random nonce, and have other validating nodes accept them as separate valid signatures.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33877
- **State**: PUBLISHED
- **Published Date**: August 11, 2023 at 02:37 UTC
- **Last Updated**: October 03, 2024 at 20:32 UTC
- **Reserved Date**: May 23, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Out-of-bounds write in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA**
Affected versions:
- version 0.25.0 (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10527
- **State**: PUBLISHED
- **Published Date**: September 08, 2020 at 09:31 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'SMEM partition can be manipulated in case of any compromise on HLOS, thus resulting in access to memory outside of SMEM address range which could lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6574AU, QCA8081, QCM2150, QCN7605, QCN7606, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6574AU, QCA8081, QCM2150, QCN7605, QCN7606, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31782
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:51 UTC
- **Last Updated**: April 01, 2025 at 19:29 UTC
- **Reserved Date**: April 01, 2025 at 13:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in pupunzi mb.YTPlayer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects mb.YTPlayer: from n/a through 3.3.8.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**pupunzi - mb.YTPlayer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpmbytplayer/vulnerability/wordpress-mb-ytplayer-plugin-3-3-8-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4093
- **State**: PUBLISHED
- **Published Date**: April 03, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT208462)
2. [](https://support.apple.com/HT208465)
3. [1040265](http://www.securitytracker.com/id/1040265)
4. [102782](http://www.securityfocus.com/bid/102782)
5. [](https://support.apple.com/HT208464)
6. [1040267](http://www.securitytracker.com/id/1040267)
7. [](https://support.apple.com/HT208463) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5735
- **State**: PUBLISHED
- **Published Date**: November 06, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in include/common.php in PunBB before 1.2.14 allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the language parameter, related to register.php storing a language value in the users table.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1017131](http://securitytracker.com/id?1017131)
2. [1824](http://securityreason.com/securityalert/1824)
3. [30132](http://www.osvdb.org/30132)
4. [20061030 Punbb <= 1.2.13 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/450055/100/0/threaded)
5. [ADV-2006-4256](http://www.vupen.com/english/advisories/2006/4256)
6. [](http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities)
7. [22622](http://secunia.com/advisories/22622)
8. [](http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5338
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 20, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32806
- **State**: PUBLISHED
- **Published Date**: April 24, 2024 at 14:52 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 18, 2024 at 10:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in CoSchedule Headline Analyzer.This issue affects Headline Analyzer: from n/a through 1.3.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**CoSchedule - Headline Analyzer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/headline-analyzer/wordpress-headline-analyzer-plugin-1-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Majed Refaea (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0655
- **State**: PUBLISHED
- **Published Date**: May 02, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: February 01, 2007 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
The MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan 8.0.671.1, and possibly other versions, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [escan-mwagent-security-bypass(34009)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34009)
2. [ADV-2007-1609](http://www.vupen.com/english/advisories/2007/1609)
3. [23759](http://www.securityfocus.com/bid/23759)
4. [35732](http://osvdb.org/35732)
5. [23809](http://secunia.com/advisories/23809)
6. [](http://secunia.com/secunia_research/2007-45/advisory/)
7. [1018007](http://www.securitytracker.com/id?1018007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0258
- **State**: PUBLISHED
- **Published Date**: April 02, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 21, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf)
2. [80891](http://osvdb.org/80891)
3. [48675](http://secunia.com/advisories/48675)
4. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24843
- **State**: PUBLISHED
- **Published Date**: February 07, 2022 at 15:47 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The SupportCandy WordPress plugin before 2.2.7 does not have CRSF check in its wpsc_tickets AJAX action, which could allow attackers to make a logged in admin call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - SupportCandy – Helpdesk & Support Ticket System**
Affected versions:
- 2.2.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d)
### Credits
- Brandon Roldan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8403
- **State**: PUBLISHED
- **Published Date**: December 10, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: December 02, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2239](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb15-32.html)
3. [78715](http://www.securityfocus.com/bid/78715)
4. [SUSE-SU-2015:2236](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html)
5. [SUSE-SU-2015:2247](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html)
6. [1034318](http://www.securitytracker.com/id/1034318)
7. [GLSA-201601-03](https://security.gentoo.org/glsa/201601-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43587
- **State**: PUBLISHED
- **Published Date**: December 21, 2021 at 17:05 UTC
- **Last Updated**: September 17, 2024 at 03:44 UTC
- **Reserved Date**: November 12, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Dell - PowerPath Management Appliance**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000194083/dsa-2021-260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30758
- **State**: PUBLISHED
- **Published Date**: June 01, 2023 at 00:00 UTC
- **Last Updated**: January 09, 2025 at 17:53 UTC
- **Reserved Date**: May 11, 2023 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Pleasanter 1.3.38.1 and earlier allows a remote authenticated attacker to inject an arbitrary script.
### Affected Products
**Implem Inc. - Pleasanter**
Affected versions:
- 1.3.38.1 and earlier (Status: affected)
### References
1. [](https://pleasanter.org/archives/vulnerability-update-202305)
2. [](https://github.com/Implem/Implem.Pleasanter/issues/474)
3. [](https://jvn.jp/en/jp/JVN62111727/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3681
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:20 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**n/a - ansible**
Affected versions:
- ansible 3.3.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1989407)
2. [](https://github.com/ansible/galaxy/issues/1977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30890
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:55 UTC
- **Last Updated**: March 27, 2025 at 18:57 UTC
- **Reserved Date**: March 26, 2025 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SuitePlugins Login Widget for Ultimate Member allows PHP Local File Inclusion. This issue affects Login Widget for Ultimate Member: from n/a through 1.1.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**SuitePlugins - Login Widget for Ultimate Member**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/login-widget-for-ultimate-member/vulnerability/wordpress-login-widget-for-ultimate-member-plugin-1-1-2-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6005
- **State**: PUBLISHED
- **Published Date**: January 28, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the CheckUniqueName function in W3C Amaya Web Browser 10.0.1, and possibly other versions including 11.0.1, might allow remote attackers to execute arbitrary code via "duplicated" attribute value inputs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507587#15)
2. [33736](http://www.securityfocus.com/bid/33736) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48590
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:15 UTC
- **Last Updated**: October 07, 2024 at 13:35 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3165
- **State**: PUBLISHED
- **Published Date**: September 15, 2009 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 17:43 UTC
- **Reserved Date**: September 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Bug.create WebService function in Bugzilla 2.23.4 through 3.0.8, 3.1.1 through 3.2.4, and 3.3.1 through 3.4.1 allows remote attackers to execute arbitrary SQL commands via unspecified parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.bugzilla.org/security/3.0.8/)
2. [36373](http://www.securityfocus.com/bid/36373)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=515191)
4. [36718](http://secunia.com/advisories/36718) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0879
- **State**: PUBLISHED
- **Published Date**: March 14, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 02:57 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge in Windows 10 1709 allows information disclosure, due to how Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability".
### Affected Products
**Microsoft Corporation - Microsoft Edge**
Affected versions:
- Windows 10 1709 (Status: affected)
### References
1. [103303](http://www.securityfocus.com/bid/103303)
2. [1040507](http://www.securitytracker.com/id/1040507)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.